Encapsulate Data: Hide internal implementation facts of objects, exposing only required interfaces for conversation.Comply with Restrictions: Adhere to data safety rules and criteria by employing encryption steps.11. Reads trade Journals and technical manuals, and attends conferences and seminars to maintain knowledge of hardware and software.If an